public key infrastruture don sheehy ([email protected])[email protected]

30
PUBLIC KEY INFRASTRUTURE Don Sheehy ( [email protected] )

Post on 19-Dec-2015

220 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

PUBLIC KEY INFRASTRUTURE

Don Sheehy ([email protected])

Page 2: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

WHO HAS HEARD ABOUT

Verisign EnTrust Baltimore

Page 3: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

First – The Basics PKI

– A public-key infrastructure is a set of services for managing public keys.

Keys – A key is a string of bits used to encrypt and/or decrypt

data. Encryption makes data unintelligible. Decryption restores the data to its pre-encrypted form, making it intelligible again.

Cryptography– Cryptography is the science and practice of encrypting

and decrypting. There are two kinds of cryptography in common use: secret key and public key.

Page 4: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Basics - Encryption Secret Key Encryption

– Same key is used to encrypt and decrypt. Problem of secure key distribution. - if you want to send me an encrypted message, you have to securely send me the secret key first. This creates a chicken-and-egg dilemma: To set up a secure communication system, you need a secure communication system.

Public Key Encryption– Uses key pairs – each having one public and one private

key. Data encrypted with one key in the pair is decrypted using the other key. To send encrypted message, you encrypt it with my public key – not a secret. Decryp. requires private key, only I possess.

Page 5: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Certificates

Certificates– Public keys are usually combined with other

information in a certificate, a digital document (i.e. a formatted file) attesting to the binding of a public key to an individual, computer, program, or other entity. A certificate verifies that a specific public key does in fact belong to a specific entity.

Page 6: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Contents

Certificate Contents– At a minimum, a certificate contains a public

key and a name. Typically, a certificate also contains a serial number, an expiration date, and the name of the Certification Authority (CA) that issued the certificate. Also included in the certificate is the digital signature of the CA, proving the certificate really did originate from that CA.

Page 7: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Digital Certificates

Digital Signatures– A digital signature is a block of data that has

been encrypted with the sender's private key. The recipient decrypts the data with the sender's public key, verifying the sender's identity in a fashion that cannot be repudiated.

Page 8: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

What is a CA?

The Certification Authority is an org that provides a level of assurance that the public key contained in the dig certificate does indeed belong to the entity named in the certificate.

This document is digitally signed by a trusted organization referred to as a Certification Authority (CA). The basic premise is that the CA is vouching for the link between an individual’s identity and his or her public key.

Page 9: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

What is an RA?

A Registration Authority (RA) is an entity that is responsible for the identification and authentication of subscribers, but does not sign or issue certificates.

In some cases, the CA performs the subscriber registration function internally. In other cases, the CA might delegate the RA function to external registration authorities that may or may not be part of the same legal entity as the CA.

Page 10: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

The Process

Subscriber CARA

Repository

RelyingParty

Provides proofof identity

Registration function(performed by CA

or separate RA)

Verifies Subscriber’sidentity

Issues certificateand posts inrepository

May be housedby CA or otherentity

Binds public keyto Subscriber

Validates CA’ssignature on theSubscriber’scertificate

Page 11: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

PKI Functions Key registration: The Registration Authority (RA)

issues a new certificate for a public key. The CA signs the certificate, stamps it with an expiration date, and either returns it to the requester or stores it in a repository.

Certificate revocation: Through an administrative console, the security manager cancels a previously issued certificate by placing it on a Certificate Revocation List (CRL).

Page 12: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

PKI Functions

Storing and retrieving certificates and Certificate Revocation Lists (CRL): Upon request, typically via a directory, the CA provides a CRL and/or a particular entity's certificate.

Trust evaluation: The CA determines whether a certificate is valid and what operations it authorizes.

Page 13: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

PKI Standards The main group developing standards for PKI

interoperability is the PKI working group of the Internet Engineering Task Force (IETF), known as the PKIX group (which stands for PKI for X.509 certificates).

PKIX standards permit multiple PKIs to interoperate, or multiple applications to interface with a single PKI. There are also a number of standards that assume PKI. Among the most important are Secure Sockets Layer (SSL) and Internet Protocol Security Protocol (IPSEC).

Page 14: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

SSL

Secure Sockets Layer (SSL)– One common use of PKI today is within the

Secure Sockets Layer (SSL) protocol. SSL can negotiate encryption keys and authenticate the server before data is exchanged by the higher-level application. The SSL protocol maintains the security and integrity of the transmission channel by using encryption, authentication and message authentication codes.

– Optimized for HTTP

Page 15: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

IPSEC

The IETF Internet Protocol Security Protocol (IPSEC) standard, which defines protocols for IP encryption, is one of the main protocols used for Virtual Private Networks (VPNs). IPSEC uses keys for encryption and authentication.

Ideally, PKI would provide end-to-end security from client to client, including authentication of the individuals using those client machines.

Page 16: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

What is PKI Used For Most computers unable to secure private keys

properly Main use is for identifying non-client computers:

Web servers, messaging servers, routers, and VPN gateways.

Online banking, the bank's Web server may give your browser a certificate proving that you have accessed the correct server. However, you probably use a username and password, not a certificate, to prove your identity to the Web server.

Page 17: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Secure E-Mail and Messaging Secure e-mail, messaging and groupware

applications may encrypt messages and files and use digital signatures, to ensure authentication, privacy, and data integrity. EDI systems use PKI for financial transactions.

The IETF standard secure e-mail/messaging protocol is Secure Multipurpose Internet Mail Extensions (S/MIME), which extends the Multipurpose Internet Mail Extensions (MIME) standard. S/MIME typically uses a PKI to digitally sign messages and to encrypt messages and attachments.

Page 18: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

High-Value Web Transactions

Increasingly, Web applications such as e-business and online stock trading, must support high-value transactions. For such applications, browsers, Webservers, and commerce servers can use PKI for authentication and confidentiality. As with messaging, servers authenticate themselves to clients using SSL, while clients are not typically authenticated. Web servers also use SSL to encrypt traffic.

Page 19: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Virtual Private Networks (VPNs)

Encryption and authentication convert public Internet links into Virtual Private Networks (VPNs), for site-to-site (router-to-router) or client-to-server links. VPNs also use tunneling protocols that wrap, or encapsulate, one protocol in another. IPSEC is the emerging standard for site-to-site tunneling.

Page 20: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Digitally Signed Code And Files

Digital signatures can be used to verify the source and the integrity of downloaded content, preventing the spread of viruses. Technologies like Microsoft's Authenticode support PKI to make it possible to use this approach on a mass scale.

Page 21: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Implementation Issues

PKI-enabling applications and training personnel. Planning must encompass both new technology and existing security infrastructure and business practices. Extensive staff may be needed for PKI tasks

Interoperability and cross-validation of certs Legal Issues – who is liable for misuse

Page 22: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

What are the Risks with CAs

Unless they are subject to governmental licensing and regulation, CAs may use different standards or procedures to verify the identity of persons to whom they issue certificates.

Thus a digital signature is only as reliable as the CA is trustworthy in performing its functions. Consequently, a relying party needs some way to gauge how much reliance it should place on a digital signature supported by a certificate issued by a particular CA.

Page 23: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Risks CA topology (for example, a hierarchical, cross-

certified, or a hybrid model) is a developing issue. Which model is most appropriate depends on the particular business circumstances.

Although it is important that public keys be certified, the issuance of nonstandard certificates can be a concern. For example, if X.509 data format standard is not used, subscribers and relying parties may be unable to process such certificates.

Implementing the cross-certified CA model (discussed above) would also be very difficult.

Page 24: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

What We Can Do

WebTrust for Certification Authorities Key Witnessing and Other

Page 25: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

WebTrust for Certification Auth.

Developed 2000 Provides a new framework for reporting

activities of certification authorities Requires reporting on compliance with the

AICPA/CICA WebTrust Principles and Criteria for Certification Authorities.

Differs from SAS 70/ Handbook 5900

Page 26: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

The Principles

CA Business Practices Disclosure Service Integrity CA Environmental Controls

Page 27: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

CA Business Practices Disclosure The Certification Authority discloses its key and

certificate life cycle management business and information privacy practices and provides its services in accordance with its disclosed practices

The criteria were derived primarily from X.509 Public Key Infrastructure Certificate Policy and Certification Practices FrameworkRequest For Comments Draft (RFC 2527)

Page 28: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Service Integrity

The Certification Authority maintains effective controls to provide reasonable assurance that– - Subscriber information was properly authenticated

(for the registration activities performed by ABC-CA).

– The integrity of keys and certificates it manages is established and protected throughout their life cycles.

Page 29: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

CA Environmental Controls

-Subscriber and relying party information is restricted to authorized individuals and protected from uses not specified in the CA’s business practices disclosure.

The continuity of key and certificate life cycle management operations is maintained.

-CA systems development, maintenance, and operation are properly authorized and performed to maintain CA systems integrity.

Page 30: PUBLIC KEY INFRASTRUTURE Don Sheehy (dsheehy@grantthornton.ca)dsheehy@grantthornton.ca

Microsoft

The public keys of many common Root CAs are pre-loaded into standard Web browser software (for example, Netscape Navigator or Microsoft Internet Explorer).

This allows the relying party to verify the issuing CA’s signature using the CA’s public key to determine whether the certificate was issued by a trusted CA.